1 |
M. Theobald, G. Weikum, and R. Schenkel, “Top-k query evaluation with probabilistic guarantees,” in Proc. of the International Conference on Very Large Data Bases, 2004. Article (CrossRef Link).
|
2 |
K. Chakrabarti, V. Ganti, J. Han, and D. Xin, “Ranking objects based on relationships,” in Proc. of the ACM SIGMOD international conference on Management of data, 2006. Article (CrossRef Link).
|
3 |
T. Cheng, X. Yan, and K.C.C. Chang, “EntityRank: searching entities directly and holistically,” in Proc. of the International Conference on Very Large Data Bases, 2007. Article (CrossRef Link).
|
4 |
N. Ntarmos, I. Patlakas, and P. Triantafillou, “Rank join queries in NoSQL databases,” in Proc. of the International Conference on Very Large Data Bases, 2014. Article (CrossRef Link).
|
5 |
C. Doulkeridis, A. Vlachou, K. Norvag, Y. Kotidis, and N. Polyzotis, “Processing of Rank Joins in Highly Distributed Systems,” in Proc. of the International Conference on Data Engineering, 2012. Article (CrossRef Link).
|
6 |
R. Yu, M. Nagendra, P. Nagarkar, K.S. Canda, and J.W. Kim, “Data-Utility Sensitive Query Processing on Server Clusters to Support Scalable Data Analysis Services,” Lecture Notes in Business Information Processing, 74, pp. 155-184, 2011. Article (CrossRef Link).
|
7 |
N.D. Han, L. Han, D.M. Tuan, H.P. In, and M. Jo., “A Scheme for Data Confidentiality in Cloud-assisted Wireless Body Area Networks,” Information Sciences, 284, pp. 157-166, 2014. Article (CrossRef Link).
DOI
|
8 |
K. Liang, M.H. Au, J.K. Liu, W. Susilo, D.S. Wong, G. Yang, Y. Yu, and A. Yang, “A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing,” Future Generation Computer Systems, 52, pp. 95-108, 2015. Article (CrossRef Link).
DOI
|
9 |
Q. Xu, P. Ren, H. Song, and Q. Du, “Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations,” IEEE Access, 4, pp. 2840 – 2853, 2016. Article (CrossRef Link).
DOI
|
10 |
I. Butun, M. Erol-Kantarci, B. Kantarci, and H. Song, “Cloud-centric multi-level authentication as a service for secure public safety device networks, IEEE Communications Magazine, 54(4), pp. 47-59, 2016. Article (CrossRef Link).
DOI
|
11 |
W. Wei, X. Fan, H. Song, X. Fan, and J. Yang, “Imperfect Information Dynamic Stackelberg Game Based Resource Allocation Using Hidden Markov for Cloud Computing,” IEEE Transactions on Services Computing, 2016. Article (CrossRef Link).
|
12 |
M. Shojafar, N. Cordeschi, and E. Baccarelli, “Energy-efficient Adaptive Resource Management for Real-time Vehicular Cloud Services,” IEEE Transactions on Cloud Computing, 2016. Article (CrossRef Link).
|
13 |
H. Dou, Y. Qi, W. Wei, and H. Song, “Minimizing Electricity Bills for Geographically Distributed Data Centers with Renewable and Cooling Aware Load Balancing,” in Proc. of International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI), 2015. Article (CrossRef Link).
|
14 |
N. Cordeschi, M. Shojafar, and E. Baccarelli, “Energy-saving self-configuring networked data centers. Computer Networks,” 57(17), pp. 3479-3491, 2013. Article (CrossRef Link).
DOI
|
15 |
C. Li, Z. Sun, H. Wang, and H. Song. “A Novel Energy-Efficient k-Coverage Algorithm Based on Probability Driven Mechanism of Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, 2016. Article (CrossRef Link).
|
16 |
Amazon EC2. https://aws.amazon.com/ec2/. Article (CrossRef Link).
|
17 |
Z. Sun, Y. Zhang, Y. Nie, W. Wei, J. Lloret, and H. Song, “CASMOC: a novel complex alliance strategy with multi-objective optimization of coverage in wireless sensor networks,” Wireless Network, 2016. Article (CrossRef Link).
|
18 |
A. Boldyreva, N. Chenette, Y. Lee, and A. ONeill, “Order-preserving Symmetric Encryption,” in Proc. of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2009.Article (CrossRef Link).
|
19 |
R. Fagin, “Combining fuzzy information from multiple systems,” Journal of Computer and System Sciences, 58(1), 89-99, 1999. Article (CrossRef Link).
DOI
|
20 |
R. Fagin, A. Lotem, and M. Naor, “Optimal aggregation algorithms for middleware,” Journal of Computer and System Sciences, 64(4), pp. 614-656, 2003. Article (CrossRef Link).
DOI
|
21 |
Microsoft Azure. https://azure.microsoft.com/. Article (CrossRef Link).
|
22 |
M. Li, S. Yu, K. Ren, and W. Lou, “Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings,” in Proc. of International ICST Conference on Security and Privacy in Communication Networks, 2010. Article (CrossRef Link).
|
23 |
K. Wu, E.J. Otoo, and A. Shoshani, “Optimizing bitmap indices with efficient compression,” JACM Transactions on Database Systems, 31(1), 1-38, 2006. Article (CrossRef Link).
DOI
|
24 |
Transaction Processing Performance Council. http://www.tpc.org. Article (CrossRef Link).
|
25 |
Microsoft Healthvault. http://www.healthvault.com. Article (CrossRef Link).
|
26 |
K.H. Huang, E.C. Chang, and S.J. Wang, “A Patient Centric Access Control Scheme for Personal Health Records in the Cloud.” in Proc. of Fourth International Conference on Networking and Distributed Computing, 2014. Article (CrossRef Link).
|
27 |
R.A. Popa, C.M.S. Redfield, N. Zeldovich, and H. Balakrishnan, “CryptDB: protecting confidentiality with encrypted query processing,” in Proc. of the ACM Symposium on Operating Systems Principles, 2011. Article (CrossRef Link).
|
28 |
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Order preserving encryption for numeric data,” in Proc. of the ACM SIGMOD international conference on Management of data, 2004. Article (CrossRef Link).
|
29 |
T. Ge and S. Zdonik, “Answering aggregation queries in a secure system model,” in Proc. of the International Conference on Very Large Data Bases, 2007. Article (CrossRef Link).
|
30 |
H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra, “Executing SQL over encrypted data in the database-service-provider model,” in Proc. of the ACM SIGMOD international conference on Management of data, 2002. Article (CrossRef Link).
|
31 |
S. Tu, M.F. Kaashoek, S. Madden, and N. Zeldovich, “Processing analytical queries over encrypted data,” in Proc. of the International Conference on Very Large Data Bases, 2013. Article (CrossRef Link).
|
32 |
W.K. Wong, B. Kao, D.W.L. Cheung, R.Li, and S.M. Yiu, “Secure query processing with data interoperability in a cloud database environment,” in Proc. of the ACM SIGMOD international conference on Management of data, 2014. Article (CrossRef Link).
|
33 |
R. Fagin, A. Lotem, and M. Naor, “Optimal Aggregation Algorithms for Middleware,” in Proc. of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database system, 2001. Article (CrossRef Link).
|
34 |
S. Nepal and M.V. Ramakrishna, “Query processing issues in image(multimedia) databases,” in Proc. of the International Conference on Data Engineering, 1999. Article (CrossRef Link).
|
35 |
B. Arai, G. Das, D. Gunopulos, and N. Koudas, “Anytime measures for top-k algorithms,” in Proc. of the International Conference on Very Large Data Bases, 2007. Article (CrossRef Link).
|